PASCUA, Samuel G.
BSEE - V
Terminologies and Acronyms
Applications
Complete, self-contained programs that perform a specific function (ie.
spreadsheets, databases)
Bit
A computer's most basic unit of information
Boot
The process of loading or initializing an operating system on a computer; usually
occurs as soon as a computer is turned on
Browser
A program used to view World Wide Web pages, such as Netscape Navigator or
Internet Explorer
Bug
A part of a program that usually causes the computer to malfunction; often
remedied in patches or updates to the program
Byte
Small unit of data storage; 8 bits; usually holds one character
Database
A large structured set of data; a file that contains numerous records that contain
numerous fields
PASCUA, Samuel G.
BSEE - V
DHCP
The dynamic host configuration protocol allows computers to automatically
request and be assigned IP addresses and other network settings. For example,
when you connect your laptop or smartphone to your Wi-Fi network, your device
asks the router for an IP address using DHCP and the router assigns an IP
address. This simplifies things you dont have to set up static IP addresses
manually.
DNS
The domain name system is how computers convert human-readable domain
names and hostnames to numerical IP addresses. When you type
howtogeek.com into your web browsers address bar, your computer contacts its
DNS server and the DNS server replies with the numerical IP address of How-To
Geeks server, which is what your computer connects to.
Youre likely using your ISPs DNS servers by default, but you can use third-party
DNS servers if you prefer.
Domain Name
Domain names are the base part of website names. like howtogeek.com or
google.com. Note that domain names are just another type of hostname.
Download
Transferring data from another computer to your computer
Driver
Software program that controls a piece of hardware or a peripheral
PASCUA, Samuel G.
BSEE - V
Ethernet
Ethernet is the standard wired network technology in use almost everywhere
today. If your computer is connected to a network via a cable, its likely using an
Ethernet cable. That cable plugs into an Ethernet port on your computer.
File
Namable unit of data storage; an element of data storage; a single sequence of
bytes
Folder
A graphical representation used to organize a collection of computer files; as in
the concept of a filing cabinet (computer's hard drive) with files (folders)
Freeware
Software provided at no cost to the user
Gateway
A gateway is a device that routes traffic between networks. For example, at
home, your router is your gateway. It provides a gateway between your LAN
and WAN.
Gigabyte
1,073,741,824 bytes or 1,024 megabytes; generally abbreviated GB
GUI
Graphical user interface; uses pictures and words to represent ideas, choices,
functions, etc.
PASCUA, Samuel G.
BSEE - V
Internet
A network of computer networks encompassing the World Wide Web, FTP,
telnet, and many other protocols
IP number
Internet protocol; a computer's unique address or number on the Internet
IPv4 and IPv6
There are two types of IP address in common use. Older IPv4 (IP version 4)
addresses are the most common, followed by newer IPv6 (IP version 6)
addresses. IPv6 is necessary because we just dont have enough IPv4
addresses for all the people and devices in the world.
ISP
Internet service provider is the company that provides you with your Internet
connection.
Kilobyte
1,024 bytes; usually abbreviated KB
LAN
A local area network is a small network thats confined to a local area. For
example, your home network or an office network is a LAN.
MAC Address
Each network interface has a media access control address, or MAC address
also known as a physical address. This is a unique identifier designed to identify
different computers on a network. MAC addresses are usually assigned when a
manufacturer creates a network device.
For example, when you visit an airport and use 30 minutes of free Wi-Fi before
being kicked off and refused access to further Wi-FI without paying, the airports
PASCUA, Samuel G.
BSEE - V
Wi-Fi network has likely noted your devices MAC address and is using it to track
your PC and prevent you from taking advantage of more free time. MAC
addresses could also be used to assign static IP addresses to specific devices,
so theyd always get the same IP address when they connected to a router with
DHCP.
MAC addresses are actually more fluid in practice, as you can change your
network interfaces MAC address. (Yes, this means you can often gain access to
more free airport Wi-Fi by changing your devices MAC address.)
Megabyte
1,048,576 bytes or 1,024 kilobytes; enough storage to approximately equal a
600-page paperback book; generally abbreviated Mb
Memory
Any device that holds computer data
Menu
A list of operations available to the user of a program
Network
A collection of computers that are connected
Peripheral
Any of a number of hardware devices connected to a CPU
Router
A router is a device that passes traffic back and forth. You likely have a home
router. Its that routers job to pass outgoing traffic from your local devices to the
Internet, and to pass incoming traffic from the Internet to your devices.
PASCUA, Samuel G.
BSEE - V
Spreadsheet
A program arranged in rows and columns that manipulates numbers
Tool Bar
A graphical representation of program activities; a row of icons used to perform
tasks in a program
URL
Uniform resource locator; the address of a site on the World Wide Web; a
standard way of locating objects on the Internet
Virus
A deliberately harmful computer program designed to create annoying glitches or
destroy data
Window
A screen in a software program that permits the user to view several programs at
one time
Word Processor
A program that allows the user to create primarily text documents
PASCUA, Samuel G.
BSEE - V
Computer Hardware/Peripherals
Hardware - The physical parts of a computer
CPU
Central processing unit; the brain of the computer; controls the other elements of
the computer
Disk Drive
A peripheral device that reads and/or writes information on a disk
Hard Drive
A device (usually within the computer case) that reads and writes information,
including the operating system, program files, and data files
Keyboard
A peripheral used to input data by pressing keys
Modem
A peripheral device used to connect one computer to another over a phone line
Monitor
A device used to display information visually
Mouse
A peripheral device used to point to items on a monitor
NIC
Network interface card; a board inserted in a computer that provides a physical
connection to a network
PASCUA, Samuel G.
BSEE - V
Printer
A peripheral device that converts output from a computer into a printed image
PASCUA, Samuel G.
BSEE - V
Differences between Northbridge and Southbridge
Northbridge:
The Northbridge is one of the two chips in the core logic chipset on a PC
motherboard, the other being the Southbridge. In Intel chipset systems it is
named memory controller hub (MCH) or integrated memory controller (IMCH)
if equipped with an integrated VGA.
Separating the chipset into the Northbridge and Southbridge is common,
although there are rare instances where these two chips have been combined
onto one die when design complexity and fabrication processes permit it.
The Northbridge typically handles communications among the CPU, RAM, BIOS
ROM, and PCI Express (or AGP) video cards, and the Southbridge. Some north
bridges also contain integrated video controllers, also known as a Graphics and
Memory Controller Hub (GMCH) in Intel systems. Because different processors
and RAM require different signaling, a Northbridge will typically work with only
one or two classes of CPUs and generally only one type of RAM.
There are a few chipsets that support two types of RAM (generally these are
available when there is a shift to a new standard). For example, the Northbridge
from the Nvidia nForce2 chipset will only work with Socket A processors
combined with DDR SDRAM, the Intel i875 chipset will only work with systems
using Pentium 4 processors or Celeron processors that have a clock speed
greater than 1.3 GHz and utilize DDR SDRAM, and the Intel i915g chipset only
works with the Intel Pentium 4 and the Celeron, but it can use DDR or DDR2
memory.
PASCUA, Samuel G.
BSEE - V
Southbridge:
The Southbridge is one of the two chips in the core logic chipset on a PC
motherboard, the other being the Northbridge. The Southbridge typically
implements the "slower" capabilities of the motherboard in Northbridge
/Southbridge chipset computer architecture. In Intel chipset systems the
Southbridge is named Input/Output Controller Hub (ICH).
The Southbridge can usually be distinguished from the Northbridge by not being
directly connected to the CPU. Rather, the Northbridge ties the Southbridge to
the CPU. Through the use of controller integrated channel circuitry, the
Northbridge can directly link signals from the I/O units to the CPU for data control
and access.
PASCUA, Samuel G.
BSEE - V
Different Types of Computer Software
Software
- Instructions executed by a computer
Operating System
An operating system is a master program that a computer uses to execute both
user-level programs as well as the environment routines and drivers necessary
for the computer to run. Thus, on a standard personal computer an operating
system handles signals from input and output devices, manages memory usage
and controls peripherals. Therefore, the operating system is the most important
program a computer must run.
DOS, Microsoft Windows XP and Mac OS are some examples of personal
computer operating systems. Server-level computers use operating systems
such as UNIX and Microsoft Windows Server. LINUX and BSD are versatile
enough to be used either in a personal computer or as an operating system in a
server, depending on which components are installed.
With the size of most present operating systems a hard disk is required to store
the necessary files and programs. Should the operating system become
inoperable, many offer a "boot disk" option where a simpler version of the
operating system with only the necessary drivers and files is stored on removable
devices, usually a CD/DVD-ROM, USB flash drive or floppy disk. Booting the
computer with the boot disk allows the system to be accessed and repaired.
Portable devices, such as cellular phones and personal data assistants use
specialized, "embedded" operating systems that enable them to do many tasks once
only found in "platform" computers, such as email transactions, document operations
and database management.
PASCUA, Samuel G.
BSEE - V
Examples of Personal Computer/Server Operating Systems
UNIX
LINUX
PC/Microsoft DOS
A command-line operating system, MS/PC DOS helped usher in the microcomputer
age by providing an operating system that would run on the limited resources of the
8086/8088-based personal computer. Ms-dos
Microsoft Windows
Despite its numerous problems and irritations, Microsoft Windows is rightly credited
with enabling the non-technical user to operate a computer without having to learn
too many complicated commands and settings and has been instrumental to the
increased popularity of the personal computer.
MS Windows versions 1.0 and 2.x
MS Windows version 3.x
MS Windows 9x
MS Windows NT
MS Windows XP
MS Windows Vista
MS Windows 7
Examples of Embedded Operating Systems
Android
Palm OS
PASCUA, Samuel G.
BSEE - V
The Palm OS was preceded by the Japanese company PalmSource, and is the
dominant operating system for hand-helds. Over 30.1 million PalmOS units
(including licensees), according to Sept 2003 Palm Inc. financial reports; with over
22 million total USR/3Com/Palm or Palm Solutions Group branded units shipped
(over 4 million per year). Palm has many security concerns due to its mobility, such
as if lost or stolen palms may have data that can retrieved by others. Also if Palm
passwords are interconnected to your PC passwords, anyone has access to
personal files on your PC.
Symbian OS
Symbian is the operating software which is mostly used by the mobile phones.
Symbian is the biggest software producers for smart phones. There are the Symbian
codes used by different companies as well, Mika Raento has huge examples of
symbian codes. There are different companies that owns Symbian software;
examples are Sony Ericsson, Ericsson and Nokia has the highest percentage
(47.9%)
MS Windows CE
Though most versions of Microsoft Windows were developed for desktop
applications, a simpler version was created for hand-held devices called, "Windows
CE."
PASCUA, Samuel G.
BSEE - V
Firewall
A system that prevents unauthorized access to/from a private network. Can be
implemented in both hardware and software, or both. This form of security can be
used to prevent unauthorized Internet users from accessing private networks
connected to the Internet/inappropriate networks.
Applications
Applications are referred to as a type of computer software where the computer's
capabilities directly reflect that of the task
Custom
Custom software is under the category of application software. The word custom
means that the software is specially made for the individual and/or company
needs. This software is created by the programmers and software engineers.
Custom software can be very expensive since it is only developed on demand. A
very good example of a custom software is the application of it in space crafts,
ATM'S, and super market checkout machines. Custom software, which can also
be called bespoke software, is only created for individual companies to be used
for research and other things. It is also a risk for a company to develop custom
software since it is very expensive or demands huge sums of money to develop.
Commercial
Commercial Software, also known as Proprietary Software or Packaged
Software, is software that can be bought and sold. Commercial Software is
copyrighted, so you must pay for it in some respect. Examples of this are
Microsoft Excel or Adobe Photoshop.
Commercial software is generally bought in retails stores in a physical form.
However, in some cases you can download the program you desire over the
internet for a lesser fee. Commercial software programs use things such as
passwords and user registrations to make sure only paid customers are using the
PASCUA, Samuel G.
BSEE - V
program. Commercial software such as Norton AntiVirus uses thirty day free
trials to familiarize the user with the product before they purchase it.
Shareware
Shareware is basically "try before you buy" software. Unlike most software where
you have to buy the software before you can actually use it, the concept of
Shareware lets you try a program for a short period of time before you buy it.
This gives the consumer an opportunity to test out the software and see if it suits
his needs or not. This not only helps the consumer get a feel for the product but
is also beneficial to the company providing the Shareware Software to market
their product. Shareware has the ultimate money-back guarantee - if you don't
use the product, you don't pay for it!
Open Source
Software that has released the files it was written in, usually free, so you can
download and change the original code, therefore changing the program.
Viro has contributed 1,571 changes to the kernel, which sits at the core of the
Linux operating system, over the past three years, according to a new report
from the Linux Foundation. That's more than any other individual developer, the
report states. In contrast, Torvalds, the kernel's creator and steward, contributed
495 changes.
During the past three years, the top 10 individual developers have contributed
nearly 15 percent of the changes to the kernel, while the top 30 developers have
submitted 30 percent, the report states.
Utilities
Also known as service programs. Utilities perform a variety of functions like disk
defragmenting or data compression. When utilities become popular they are
usually incorporated into the operating system.
PASCUA, Samuel G.
BSEE - V
Driver
A computer driver is a program that controls a device. There are device drivers
for printers, displays, CD-ROM readers, diskette drives, and so on. For other
devices, you may need to install a new driver when you connect the device to
your computer. In DOS systems, drivers are files with a .SYS extension. In
Windows environments, drivers often have a .DRV extension.
A driver acts like a translator between the device and programs that use the
device. Each device has its own set of specialized commands that only its driver
knows. In contrast, most programs access devices by using generic commands.
The driver, therefore, accepts generic commands from a program and then
translates them into specialized commands for the device.
Virus
A virus is a program that can destroy and corrupt data on a computer. It can
come through a floppy disk, CD, or USB, but now usually comes through email.
Virus are programs that can copy themselves and create problems in one
computer without the user ever knowing or authorizing it. Virus can only be
spread when they are taken to an uninfected computer. Viruses are commonly
confused with computer worms and Trojan horses. A worm has the capabilities to
spread itself to other computers without needing to be transferred as part of a
host. Trojan horses are files that appear to be harmless until they are executed.
Antivirus software is a computer program that attempts to identify and eliminate
computer viruses. There are two different techniques to accomplish this,
examining(scanning) and identifying suspicious behavior
PASCUA, Samuel G.
BSEE - V
Different Types of Databases
Relational Databases
This is the most common of all the different types of databases. In this, the data
in a relational database is stored in various data tables. Each table has a key
field which is used to connect it to other tables. Hence all the tables are related to
each other through several key fields. These databases are extensively used in
various industries and will be the one you are most likely to come across when
working in IT.
Examples of relational databases are Oracle, Sybase and Microsoft SQL Server
and they are often key parts of the process of software development. Hence you
should ensure you include any work required on the database as part of your
project when creating a project plan and estimating project costs.
Operational Databases
In its day to day operation, an organisation generates a huge amount of data.
Think of things such as inventory management, purchases, transactions and
financials. All this data is collected in a database which is often known by several
names such as operational/ production database, subject-area database (SADB)
or transaction databases.
An operational database is usually hugely important to Organisations as they
include the customer database, personal database and inventory database ie the
details of how much of a product the company has as well as information on the
customers who buy them. The data stored in operational databases can be
changed and manipulated depending on what the company requires.
Database Warehouses
Organisations are required to keep all relevant data for several years. In the UK it
can be as long as 6 years. This data is also an important source of information
PASCUA, Samuel G.
BSEE - V
for analysing and comparing the current year data with that of the past years
which also makes it easier to determine key trends taking place. All this data
from previous years are stored in a database warehouse. Since the data stored
has gone through all kinds of screening, editing and integration it does not need
any further editing or alteration.
With this database ensure that the software requirements specification (SRS) is
formally approved as part of the project quality plan.
Distributed Databases
Many organisations have several office locations, manufacturing plants, regional
offices, branch offices and a head office at different geographic locations. Each
of these work groups may have their own database which together will form the
main database of the company. This is known as a distributed database.
End-User Databases
There is a variety of data available at the workstation of all the end users of any
organisation. Each workstation is like a small database in itself which includes
data in spreadsheets, presentations, word files, note pads and downloaded files.
All such small databases form a different type of database called the end-user
database.
External Database
There is a sea of information available outside world which is required by an
organisation. They are privately-owned data for which one can have conditional
and limited access for a fortune. This data is meant for commercial usage. All
such databases outside the organisation which are of use and limited access are
together called external database.
PASCUA, Samuel G.
BSEE - V
Hypermedia Database
Most websites have various interconnected multimedia pages which might
include text, video clips, audio clips, photographs and graphics. These all need to
be stored and called from somewhere when the webpage if created. All of them
together form the hypermedia database.
Navigational Database
Navigational database has all the items which are references from other objects.
In this, one has to navigate from one reference to other or one object to other. It
might be using modern systems like XPath. One of its applications is the air flight
management systems.
In-Memory Database
An in-memory database stores data in a computers main memory instead of
using a disk-based storage system. It is faster and more reliable than that in a
disk. They find their application in telecommunications network equipments.
Document-Oriented Database
A document oriented database is a different type of database which is used in
applications which are document oriented. The data is stored in the form of text
records instead of being stored in a data table as usually happens.
Real-Time Database
A real-time database handles data which constantly keep on changing. An
example of this is a stock market database where the value of shares changes
every minute and need to be updated in the real-time database. This type of
database is also used in medical and scientific analysis, banking, accounting,
process control, reservation systems etc. Essentially anything which requires
access to fast moving and constantly changing information.
PASCUA, Samuel G.
BSEE - V
Analytical Database
An analytical database is used to store information from different types of
databases such as selected operational databases and external databases.
Other names given to analytical databases are information databases,
management databases or multi-dimensional databases. The data stored in an
analytical database is used by the management for analysis purposes, hence the
name. The data in an analytical database cannot be changed or manipulated.
PASCUA, Samuel G.
BSEE - V
Types of Network Topology
Network Topology refers to layout of a network. How different nodes in a network
are connected to each other and how they communicate is determined by the
network's topology.Network Topology refers to layout of a network. How different
nodes in a network are connected to each other and how they communicate is
determined by the network's topology.
Mesh Topology
In a mesh network, devices are connected with many redundant interconnections
between network nodes. In a true mesh topology every node has a connection to
every other node in the network. There are two types of mesh topologies:
1. Full mesh topology: occurs when every node has a circuit connecting
it to every other node in a network. Full mesh is very expensive to
implement but yields the greatest amount of redundancy, so in the event
that one of those nodes fails, network traffic can be directed to any of the
other nodes. Full mesh is usually reserved for backbone networks.
2. Partial mesh topology: is less expensive to implement and yields less
redundancy than full mesh topology. With partial mesh, some nodes are
organized in a full mesh scheme but others are only connected to one or
two in the network. Partial mesh topology is commonly found in peripheral
networks connected to a full meshed backbone.
PASCUA, Samuel G.
BSEE - V
Star Topology
In a star network devices are connected to a central computer, called a hub.
Nodes communicate across the network by passing data through the hub.
Main Advantage: In a star network, one malfunctioning node doesn't affect the
rest of the network.
Main Disadvantage: If the central computer fails, the entire network becomes
unusable.
Bus Topology
In networking a bus is the central cable -- the main wire -- that connects all
devices on a local-area network (LAN). It is also called the backbone. This is
often used to describe the main network connections composing the Internet.
Bus networks are relatively inexpensive and easy to install for small networks.
Ethernet systems use a bus topology.
Main Advantage: It's easy to connect a computer or device and typically it
requires less cable than a star topology.
Main Disadvantage: The entire network shuts down if there is a break in the
main wire and it can be difficult to identify the problem if the network shuts down.
PASCUA, Samuel G.
BSEE - V
Ring Topology
A local-area network (LAN) whose topology is a ring. That is, all of the nodes are
connected in a closed loop. Messages travel around the ring, with each node
reading those messages addressed to it.
Main Advantage: One main advantage to a ring network is that it can span
larger distances than other types of networks, such as bus networks, because
each node regenerates messages as they pass through it.
Tree Topology
This is a "hybrid" topology that combines characteristics of linear bus and star
topologies. In a tree network, groups of star-configured networks are connected
to a linear bus backbone cable.
Main Advantage: A Tree topology is a good choice for large computer networks
as the tree topology "divides" the whole network into parts that are more easily
manageable.
PASCUA, Samuel G.
BSEE - V
Main Disadvantage: The entire network depends on a central hub and a failure
of the central hub can cripple the whole network.
PASCUA, Samuel G.
BSEE - V
References:
https://www.howtogeek.com/191139/22-common-network-jargon-terms-explained/
http://web.pdx.edu/~stipakb/download/PA550/BasicComputerTerms.htm
http://computer-help-tips.blogspot.com/2011/04/northbridge-vs-southbridge.html
https://en.wikiversity.org/wiki/Types_of_Computer_Software
http://www.my-project-management-expert.com/different-types-of-databases.html
http://www.my-project-management-expert.com/different-types-of-databases-2.html
http://www.webopedia.com/quick_ref/topologies.asp